Cryptology, -ography, -analysis Flashcards

1
Q

reading hidden messages – a linguistic/ code-breaking approach.

A

Cryptology

Ito ung pagbasa ng crypto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the study of establishing a channel for secret communications. Focuses on creating secret codes. Writing hidden messages – a historical / forensic
approach.

A

Cryptography

Ito ung process sa paggawa ng Crypto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Crypto comes from a Greek word ____?

A

Kryptos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

means hidden and Graphein means to write.

A

Kryptos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

analyzing hidden messages – a statistical /
analytical approach and Is the extraction of the information from the coded
message

A

Cryptanalysis

ito ung pag-deeper analyze ng crypto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The person practicing Cryptanalysis is called a ____?

A

Cryptanalyst

Person ito

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The process of remodeling information into
nonhuman readable form
is named ____?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process of reversing encryption is named
____?

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The encrypted information is understood as
a ____?

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To determine the weak points of acryptographic system, it is important to attack the system. These attacks are called ____?

A

Cryptanalytic attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In this type of attack, some plaintext-cipher text pairs are already known. This attack is easier to use as a lot of information is already available.

A

Known-Plaintext Analysis (KPA)

ATTACKS

TYPES OF CRYPTANALYTIC ATTACKES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In this type of attack, the attacker
chooses random plaintexts
and
obtains the corresponding cipher texts and tries to find the encryption key.

A

Chosen-Plaintext Analysis (CPA)

TYPES OF CRYPTANALYTIC ATTACKES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In this type of attack, only some cipher-text is known and the attacker tries to find the corresponding encryption key and plaintext. It’s the hardest to
implement
.

A

Cipher text-Only Analysis (COA)

TYPES OF CRYPTANALYTIC ATTACKES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In this type of attack, attacker intercepts the message/key
between two communicating parties
through a secured channel.

A

Man-In-The-Middle (MITM) attack

TYPES OF CRYPTANALYTIC ATTACKES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This attack is similar CPA. Here, the attacker requests the cipher texts of additional plaintexts
after they have cipher texts for some texts
.

A

Adaptive Chosen-Plaintext Analysis (ACPA)

TYPES OF CRYPTANALYTIC ATTACKES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is a very simple cipher tool used in ancient Greece, especially by the Spartans. Consists of a piece of parchment wrapped
around a rod or baton

17
Q

named after
Julius Caesar,is a type of mono-alphabetic
substitution cipher, which uses a cipher alphabet for encryption and decryption.

A

Caesar Cipher